🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 1
Domain 1 — Module 7 of 12 58%
7 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 1: Design Solutions That Align with Security Best Practices and Priorities Free ⏱ ~14 min read

Ransomware Resiliency by Design

Design defences against the most financially devastating cyberattack. Learn Microsoft's ransomware best practices, attack patterns, and how architects build resilient security architectures.

Why architects must design for ransomware

☕ Simple explanation

Ransomware is a house fire for your digital assets.

You can’t just install a smoke detector and hope for the best. A good architect designs the building so fire can’t spread — firebreaks between floors, sprinkler systems, multiple exits, and backup plans for when things go wrong despite your best efforts.

Ransomware resiliency works the same way. You design your environment so that even if an attacker gets in and encrypts some systems, the damage is contained, backups are untouched, and recovery is measured in hours — not weeks.

The SC-100 exam tests whether you can design this resilience before the attack, not just respond to it afterwards.

Ransomware is an extortion attack where adversaries encrypt an organisation’s data and demand payment for decryption keys. Modern ransomware operations — often called human-operated ransomware (HumOR) — go beyond simple encryption. Attackers spend weeks inside the network, escalating privileges, disabling security tools, exfiltrating data for double extortion, and targeting backup infrastructure to eliminate recovery options.

Microsoft’s ransomware best practices focus on three phases: prepare (reduce attack surface and harden defences), limit (contain blast radius if compromised), and recover (restore operations from protected backups). A cybersecurity architect designs all three phases into the environment architecture — not as incident response procedures, but as architectural properties of the system.

The ransomware attack lifecycle

Modern ransomware attacks follow a predictable pattern. Understanding this lifecycle helps architects design defences at each stage:

PhaseWhat Attackers DoTime FrameArchitect’s Defence
Initial accessPhishing, exploiting public-facing apps, compromised credentialsDay 1MFA, Conditional Access, attack surface reduction, patching
PersistenceInstall backdoors, create accounts, disable security toolsDays 1-3Endpoint detection (EDR), tamper protection, monitoring
Privilege escalationSteal credentials, exploit misconfigurations, move laterallyDays 3-14Least privilege, PIM, network segmentation, credential hygiene
ReconnaissanceMap the network, identify crown jewels, find backup systemsDays 7-21Microsegmentation, deception technology, audit logging
Data exfiltrationCopy sensitive data for double extortionDays 14-28DLP, network monitoring, egress filtering
EncryptionDeploy ransomware across all accessible systems simultaneouslyDay 28+Backup isolation, immutable storage, rapid recovery plans
💡 Exam tip: Human-operated vs automated ransomware

The exam distinguishes between automated ransomware (commodity malware that spreads indiscriminately) and human-operated ransomware (HumOR) (targeted attacks with living-off-the-land techniques).

HumOR is far more dangerous because attackers:

  • Adapt to your defences in real-time
  • Specifically target backup infrastructure
  • Exfiltrate data before encryption (double extortion)
  • Use legitimate admin tools (PowerShell, RDP, PsExec) making detection harder

If an exam question mentions “advanced persistent threat,” “targeted attack,” or “weeks of attacker activity,” think HumOR — and design for all three phases, not just prevention.

💡 🌐 Scenario: Elena faces the board

After a competitor suffers a ransomware attack that shuts down manufacturing for three weeks, Meridian Global’s board asks Dr. Elena Vasquez: “Could this happen to us?”

Elena doesn’t answer with product names. She walks the board through Meridian’s defence at each phase:

  • Initial access: MFA enforced for all users, Conditional Access blocks legacy authentication, Defender for Office 365 filters phishing
  • Privilege escalation: PIM activated for all admin roles, lateral movement limited by network segmentation
  • Backup protection: Backups are in an isolated subscription with separate admin credentials and immutable storage
  • Recovery: Tested quarterly, target recovery time is 8 hours for critical systems

Marcus Chen, the board chair, asks: “What’s our worst case?” Elena is honest: “If an attacker gets past MFA with a token theft attack, our segmentation limits them to one zone. We lose hours of data in that zone, not weeks across the company. And we can recover because our backups are untouchable.”

This is architect thinking — connecting technical controls to business outcomes that the board understands.

Microsoft’s three-phase ransomware framework

Phase 1: Prepare — reduce the attack surface

ControlWhat It DoesMicrosoft Technology
Enforce MFA everywhereBlocks 99.9% of credential-based attacksEntra ID, Conditional Access
Eliminate legacy authenticationRemoves protocols that can’t use MFA (SMTP, IMAP, POP)Conditional Access block policy
Apply attack surface reduction (ASR)Blocks common malware execution techniquesDefender for Endpoint ASR rules
Patch promptlyCloses known vulnerabilities before exploitationWindows Update for Business, Defender Vulnerability Management
Harden internet-facing servicesReduce exposure of RDP, SMB, VPN portalsAzure Bastion, just-in-time VM access, private endpoints

Phase 2: Limit — contain the blast radius

ControlWhat It DoesMicrosoft Technology
Segment the networkPrevent lateral movement between zonesNSGs, Azure Firewall, microsegmentation
Enforce least privilegeAdmin accounts only have access when activatedPIM (just-in-time), tiered admin model
Protect credentialsPrevent credential theft and reuseCredential Guard, LAPS, Defender for Identity
Enable tamper protectionPrevent attackers from disabling security toolsDefender for Endpoint tamper protection
Monitor for lateral movementDetect attacker movement between systemsDefender for Identity, Sentinel analytics rules

Phase 3: Recover — restore from protected backups

ControlWhat It DoesMicrosoft Technology
Isolate backup infrastructurePrevent attackers from reaching backupsSeparate subscription, separate admin accounts
Use immutable storageBackups cannot be modified or deleted for a defined periodAzure Backup immutable vaults, blob versioning with legal hold
Test recovery regularlyVerify backups actually work when neededScheduled recovery drills, documented RTO/RPO
Protect backup credentialsBackup admin accounts use separate identitiesDedicated Entra accounts, MFA, no email access
Ransomware-resilient backup is the architect's last line of defence
AspectTraditional BackupRansomware-Resilient Backup
Backup locationSame network as production systemsIsolated subscription with separate admin credentials
Backup mutabilityCan be modified or deleted by any adminImmutable storage — cannot be changed for retention period
Admin accountsSame admin accounts manage backup and productionDedicated backup admin accounts with separate MFA
Recovery testingTested annually (if at all)Tested quarterly with documented results
Ransomware protectionBackups encrypted along with production dataBackups survive even if production is fully compromised

Security updates management

Unpatched systems are one of the most common initial access vectors for ransomware. The architect designs an update strategy that balances speed with stability:

Update CategoryTarget TimelineStrategy
Critical / zero-dayWithin 24-48 hoursEmergency patching, automated deployment to high-risk systems
Security updatesWithin 14 daysPhased deployment: ring 0 (test) → ring 1 (pilot) → ring 2 (production)
Feature updatesWithin 30 daysCompatibility testing, user communication, phased rollout
Firmware and driversWithin 30 daysVendor-coordinated, tested on reference hardware first
💡 Exam tip: Patching trade-offs

The exam may present scenarios where patching conflicts with business operations — a manufacturing line that can’t reboot, a financial system in a trading window, or a healthcare system mid-procedure.

The architect’s answer is never “don’t patch.” It’s “design the system so patching doesn’t require downtime” — rolling updates, blue-green deployments, maintenance windows, compensating controls (enhanced monitoring) during the patching gap.

If a question asks about OT/SCADA systems that truly cannot be patched, the architect designs compensating controls: network isolation, virtual patching (IPS rules), enhanced monitoring, and reduced exposure.

💡 🏛️ Scenario: Commander Torres's patching dilemma

Commander Aiden Torres at the Department of Federal Systems has 2,000 Windows servers and 50 legacy OT systems running SCADA software from 2015. The SCADA vendor does not support the latest OS patches.

Torres designs a tiered approach:

  • IT systems (2,000 servers): Windows Update for Business with 3 deployment rings. Critical patches within 48 hours on ring 0. Specialist Diaz manages the deployment rings from the field.
  • OT systems (50 SCADA): Network-isolated in dedicated VLANs with no internet access. Virtual patching via Defender for IoT. Enhanced monitoring via dedicated Sentinel workspace. Quarterly vendor coordination for approved patches.

Colonel Reeves asks: “Can we guarantee the SCADA systems won’t be compromised?” Torres responds: “We can’t patch them, so we isolate them. If an attacker reaches the SCADA VLAN, they had to breach three network boundaries — and we’d see it in Sentinel long before they arrive.”

This is the architect’s balance — rapid patching where possible, compensating controls where it isn’t.

Ransomware resiliency as architecture

The key insight for SC-100: ransomware resiliency isn’t a product or a process — it’s an architectural property. You design it into the environment:

Architectural DecisionResiliency Benefit
MicrosegmentationAttacker can’t move from compromised system to crown jewels
JIT admin accessNo standing privileges for attackers to exploit
Immutable backupsRecovery is guaranteed even if everything else is encrypted
Separate admin identitiesCompromising a user account doesn’t give access to infrastructure
Automated detectionLateral movement detected in minutes, not weeks
Tested recovery plansRecovery time is predictable, not a crisis discovery

🎬 Video coming soon

Key takeaways

Question

What are the three phases of Microsoft's ransomware framework?

Click or press Enter to reveal answer

Answer

1. Prepare — reduce the attack surface (MFA, patching, ASR rules). 2. Limit — contain the blast radius (segmentation, least privilege, tamper protection, credential hygiene). 3. Recover — restore from protected backups (isolated, immutable, tested).

Click to flip back

Question

What makes a backup 'ransomware-resilient'?

Click or press Enter to reveal answer

Answer

Four properties: (1) Isolated in a separate subscription with separate admin accounts, (2) Immutable storage that cannot be modified or deleted, (3) Dedicated backup admin credentials with separate MFA, (4) Regularly tested recovery with documented RTO/RPO.

Click to flip back

Question

Why is human-operated ransomware (HumOR) more dangerous than automated ransomware?

Click or press Enter to reveal answer

Answer

HumOR attackers spend weeks inside the network — escalating privileges, disabling security tools, exfiltrating data for double extortion, and targeting backup infrastructure. They adapt to defences in real-time, making each attack unique and harder to detect.

Click to flip back

Question

How should an architect handle systems that cannot be patched (e.g., OT/SCADA)?

Click or press Enter to reveal answer

Answer

Design compensating controls: network isolation (dedicated VLANs, no internet), virtual patching (IPS rules), enhanced monitoring (Defender for IoT, dedicated Sentinel workspace), and reduced exposure. Never leave unpatched systems on the general network.

Click to flip back

Knowledge check

Knowledge Check

Elena discovers that Meridian Global's backup infrastructure uses the same admin accounts as production systems. If an attacker compromises a production admin account, they could also delete backups. What should Elena recommend?

Knowledge Check

A cybersecurity architect is designing ransomware defences for a manufacturing company. Which combination of controls best addresses all three phases (prepare, limit, recover)?

Knowledge Check

Commander Torres has 50 OT/SCADA systems running legacy software that the vendor will not patch. The systems control critical infrastructure. Which approach aligns with Microsoft's security update best practices?


Next up: Backup, Recovery, and Business Continuity — deep dive into designing backup strategies, data retention policies, and business continuity architecture.

← Previous

MCRA and Cloud Security Benchmark

Next →

Ransomware Resiliency by Design

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.